CVE-2026-28387
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
07/04/2026
Last modified:
08/04/2026
Description
Issue summary: An uncommon configuration of clients performing DANE TLSA-based<br />
server authentication, when paired with uncommon server DANE TLSA records, may<br />
result in a use-after-free and/or double-free on the client side.<br />
<br />
Impact summary: A use after free can have a range of potential consequences<br />
such as the corruption of valid data, crashes or execution of arbitrary code.<br />
<br />
However, the issue only affects clients that make use of TLSA records with both<br />
the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate<br />
usage.<br />
<br />
By far the most common deployment of DANE is in SMTP MTAs for which RFC7672<br />
recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX<br />
certificate usages. These SMTP (or other similar) clients are not vulnerable<br />
to this issue. Conversely, any clients that support only the PKIX usages, and<br />
ignore the DANE-TA(2) usage are also not vulnerable.<br />
<br />
The client would also need to be communicating with a server that publishes a<br />
TLSA RRset with both types of TLSA records.<br />
<br />
No FIPS modules are affected by this issue, the problem code is outside the<br />
FIPS module boundary.
Impact
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/07e727d304746edb49a98ee8f6ab00256e1f012b
- https://github.com/openssl/openssl/commit/258a8f63b26995ba357f4326da00e19e29c6acbe
- https://github.com/openssl/openssl/commit/444958deaf450aea819171f97ae69eaedede42c3
- https://github.com/openssl/openssl/commit/7a4e08cee62a728d32e60b0de89e6764339df0a7
- https://github.com/openssl/openssl/commit/ec03fa050b3346997ed9c5fef3d0e16ad7db8177
- https://openssl-library.org/news/secadv/20260407.txt



